![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Communications of the ACM (CACM), Volume 45, 2002
Volume 45, Number 1, January 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10
- Phillip G. Armour:
The spiritual life of projects. 11-14
- Neil Munro:
Too much of a good thing. 15-17
- Lloyd W. Bartholome, David H. Olsen:
A practical approach for implementing e-commerce programs in business schools. 19-21
- Anthony M. Townsend, Anthony R. Hendrickson, Samuel M. DeMarie
:
Meeting the virtual work imperative. 23-26
- Michael Lewis, Jeffrey Jacobson:
Game engines in scientific research - Introduction. 27-31 - Michael Lewis:
The new cards. 30-31 - John E. Laird
:
Research in human-level AI using computer games. 32-35 - Wayne Piekarski, Bruce H. Thomas:
ARQuake: the outdoor augmented reality gaming system. 36-38 - Jeffrey Jacobson, Zimmy Hwang:
Unreal tournament for immersive interactive theater. 39-42 - Gal A. Kaminka, Manuela M. Veloso, Steve Schaffer, Chris Sollitto, Rogelio Adobbati, Andrew N. Marshall, Andrew Scholer, Sheila Tejada:
GameBots: a flexible test bed for multiagent team research. 43-45 - Markus Bylund, Fredrik Espinoza:
Testing and demonstrating context-aware services with Quake III Arena. 46-48 - The ACM annual report FY01. 49-52
- Murugan Anandarajan:
Internet abuse in the workplace - Introduction. 53-54 - Jeffrey M. Stanton
:
Company profile of the frequent internet user. 55-59 - Jo Ann Oravec
:
Constructive approaches to internet recreation in the workplace. 60-63 - France Bélanger, Craig Van Slyke:
Abuse or learning? 64-65 - Vivien K. G. Lim, Thompson S. H. Teo, Geok Leng Loo:
How do I loaf here? let me count the ways. 66-70 - Claire A. Simmers:
Aligning internet usage with business priorities. 71-74 - Keng Siau
, Fiona Fui-Hoon Nah
, Limei Teng:
Acceptable internet use policy. 75-79 - Andrew Urbaczewski
, Leonard M. Jessup:
Does electronic monitoring of employee internet usage work? 80-83 - Raymond R. Panko, Hazel Glenn Beh:
Monitoring for pornography and sexual harassment. 84-87
- Upkar Varshney, Andrew P. Snow, Matt McGivern, Christi Howard:
Voice over IP. 89-96 - Chittibabu Govindarajulu:
The status of helpdesk support. 97-100 - Julie Smith David
, David Schuff, Robert D. St. Louis:
Managing your total IT cost of ownership. 101-106
- Cris Kobryn:
Will UML 2.0 be agile or awkward? 107-110
- Mohamed E. Fayad:
Accomplishing software stability. 111-115 - Robert E. Filman, Stuart Barrett, Diana D. Lee, Ted Linden:
Inserting ilities by controlling communications. 116-122
- Rebecca Mercuri:
Uncommon criteria. 172
Volume 45, Number 2, February 2002
- Diane Crawford:
Editorial pointers. 5-6 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-17
- Andrew Grosso:
Why the digital millennium copyright act is a failure of reason. 19-23
- Robert L. Glass:
Stodgy by design, and the notion of 'dumbing up'. 25-27
- Felipe Castel:
Ontological computing. 29-30 - Ben Shneiderman:
ACM's computing professionals face new challenges. 31-34
- Qing Bian Zhang, Patrick Y. K. Chau:
Creating e-commerce courses with regional intent. 35-37
- Michael Grüninger, Jintae Lee:
Ontology Applications and Design - Introduction. 39-41 - Clyde W. Holsapple, K. D. Joshi:
A collaborative approach to ontology design. 42-47 - Henry Kim:
Predicting how ontologies for the semantic web will evolve. 48-54 - John O. Everett, Daniel G. Bobrow, Reinhard Stolle, Richard S. Crouch, Valeria de Paiva
, Cleo Condoravdi, Martin van den Berg, Livia Polanyi:
Making ontologies work for resolving redundancies across documents. 55-60 - Nicola Guarino
, Christopher A. Welty:
Evaluating ontological decisions with OntoClean. 61-65
- Bert J. Dempsey, Debra Weiss, Paul Jones, Jane Greenberg:
Who is an open source software developer? 67-72 - Jo Ellen Moore, Lisa A. Burke:
How to turn around 'turnover culture' in IT. 73-78 - William J. Kettinger, Choong C. Lee:
Understanding the IS-user divide in IT innovation. 79-84 - Delvin Grant:
A wider view of business process reengineering. 85-90 - Gordon Bell, Jim Gray:
What's next in high-performance computing? 91-95 - Richard T. Snodgrass:
Progress on ACM's Becoming the Preferred Publisher, Rights and responsibilities in ACM publishing. 97-101
- Thomas Erickson:
Some problems with the notion of context-aware computing. 102-104
- Evgeniy Gabrilovich
, Alex Gontmakher:
The homograph attack. 128
Volume 45, Number 3, March 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-14
- Peter J. Denning:
Internet time out. 15-18
- Meg McGinity:
Call it techonomics. 19-21
- A study of student privacy issues at Stanford University. 23-25
- Ananda Mitra:
Trust, authenticity, and discursive power in cyberspace. 27-29
- Gaurav S. Sukhatme, Maja J. Mataric:
Robots: Intelligence, Versatility, Adaptivity - Introduction. 30-32 - Rodney A. Brooks:
Humanoid robots. 33-38 - Daniela Rus, Zack J. Butler, Keith Kotay, Marsette Vona:
Self-reconfiguring robots. 39-45 - Oussama Khatib, Oliver Brock, Kyong-Sok Chang, François Conti, Diego C. Ruspini, Luis Sentis:
Robotics and interactive simulation. 46-51 - Sebastian Thrun:
Probabilistic robotics. 52-57 - Manuela M. Veloso:
Entertainment robotics. 59-63
- Richard T. Grenci, Peter A. Todd:
Solutions-driven marketing. 64-71 - John Cameron:
Configurable development processes. 72-77 - Leysia Palen:
Mobile telephony in a connected life. 78-82 - Huaiqing Wang, John Mylopoulos, Stephen Shaoyi Liao
:
Intelligent agents and financial risk monitoring systems. 83-88 - Vincent S. Lai, Wingyan Chung:
Managing international data communications. 89-93
- Ruzena Bajcsy, Craig W. Reynolds:
Computer science: the science of and about information and computation. 94-98
- Peter J. Denning, James J. Horning:
Risks of linear thinking. 120
Volume 45, Number 4, April 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-16
- Mark Guzdial
, Elliot Soloway:
Teaching the Nintendo generation to program. 17-21
- Hal Berghel:
Hijacking the web. 23-27
- Murray Turoff:
Past and future emergency response information systems. 29-32
- David Davenport:
Anonymity on the Internet: why the price may be too high. 33-35
- Jennifer Preece:
Supporting community and building social capital - Introduction. 37-39 - Thomas Erickson, Christine Halverson, Wendy A. Kellogg, Mark Laff, Tracee Wolf:
Social translucence: designing social infrastructures that make collective activity visible. 40-44 - Judith S. Donath:
A semantic approach to visualizing online conversations. 45-49 - Marc Smith:
Tools for navigating large social cyberspaces. 51-55 - Starr Roxanne Hiltz, Murray Turoff:
What makes learning networks effective? 56-59 - Amy S. Bruckman:
The future of e-learning communities. 60-63 - Dorine Andrews:
Audience-specific online community design. 64-68 - David R. Millen, Michael A. Fontaine, Michael J. Muller:
Understanding the benefit and costs of communities of practice. 69-73
- Judy E. Scott, Iris Vessey:
Managing risks in enterprise systems implementations. 74-81 - Thomas P. Schambach, J. Ellis Blanton:
The professional development challenge for IT professionals. 83-87 - Bonnie A. Nardi, Steve Whittaker, Ellen Isaacs, Mike Creech, Jeff A. Johnson, John Hainsworth:
Integrating communication and information through ContactMap. 89-95 - Mordechai Ben-Menachem, Roy Gelbard
:
Integrated IT management tool kit. 96-102 - Arnd Weber:
Enabling crypto: how radical innovations occur. 103-107
- Mohamed E. Fayad:
How to deal with software stability. 109-112
- David W. J. Stringer-Calvert:
Digital Evidence. 128
- Marie-Michèle Boulet, Faouzi Ben Jebara, Fathi Bemmira, Serge Boudreault:
A comparison of three delivery systems for teaching an information technology course. 129-135 - Vladan Devedzic
:
Understanding ontological engineering. 136-144 - Christos J. Georgiou, Petros S. Stefaneas:
Strategies for accelerating the worldwide adoption of e-commerce. 145-151 - T. Dean Hendrix, Michelle P. Schneider:
NASA's TReK project: a case study in using the spiral model of software development. 152-159 - William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson:
Java distributed objects for numerical visualization in VisAD. 160-170 - Gretchen L. Robertson, Deborah Hix:
Making the computer accessible to mentally retarded adults. 171-183 - Beverly K. Kahn, Diane M. Strong, Richard Y. Wang:
Information quality benchmarks: product and service performance. 184-192 - Anandasivam Gopal
, Tridas Mukhopadhyay, Mayuram S. Krishnan:
The role of software processes and communication in offshore software development. 193-200 - Ravi Patnayakuni, Arun Rai:
Development infrastructure characteristics and process capability. 201-210 - Leo Pipino, Yang W. Lee, Richard Y. Wang:
Data quality assessment. 211-218 - Moshe Zviran:
Securing PC applications: the relay race approach. 219-227
Volume 45, Number 5, May 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13
- Robert L. Glass:
Searching for the holy grail of software engineering. 15-16
- Phillip G. Armour:
The organism and the mechanism of projects. 17-20
- Pratyush Bharati
, Peter Tarasewich:
Global perceptions of journals publishing e-commerce research. 21-26
- Wei-Lung Wang:
Beware the engineering metaphor. 27-29
- Peter Brusilovsky
, Mark T. Maybury:
From adaptive hypermedia to the adaptive web. 30-33 - Daniel Billsus, Clifford Brunk, Craig Evans, Brian Gladish, Michael J. Pazzani:
Adaptive interfaces for ubiquitous web access. 34-38 - Barry Smyth, Keith Bradley, Rachael Rafter:
Personalization techniques for online recruitment services. 39-40 - Josef Fink, Jürgen Koenemann, Stephan Noller, Ingo Schwab:
Putting personalization into practice. 41-42 - Elisabeth André
, Thomas Rist:
From adaptive hypertext to personalized web companions. 43-46 - Keith Cheverst
, Keith Mitchell, Nigel Davies
:
The role of adaptive hypermedia in a context-aware tourist GUIDE. 47-51 - Liliana Ardissono
, Anna Goy, Giovanna Petrone, Marino Segnan:
Personalization in business-to-customer interaction. 52-53 - Marc Light, Mark T. Maybury:
Personalized multimedia information access. 54-59 - Paul De Bra:
Adaptive educational hypermedia on the web. 60-61 - Diana Bental, Alison Cawsey:
Personalized and adaptive systems for medical consumer applications. 62-63 - Alfred Kobsa:
Personalized hypermedia and international privacy. 64-67
- Edieal J. Pinker, Abraham Seidmann, Reginald C. Foster:
Strategies for transitioning 'old economy' firms to e-business. 76-83 - Christian Wagner
, Efraim Turban:
Are intelligent e-commerce agents partners or predators? 84-90 - Barry Wellman:
Designing the Internet for a networked society. 91-96 - John J. Helly, T. Todd Elvins, Don Sutton, David Martínez, Scott E. Miller
, Steward Pickett, Aaron M. Ellison
:
Controlled publication of digital scientific data. 97-101 - Ned Kock:
Managing with web-based IT in mind. 102-106
- Michael Tow Cheung, Ziqi Liao:
Time-asymmetry in business processes. 107-108
- Lauren Weinstein:
Risks of inaction. 120
Volume 45, Number 6, June 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum - Weighing in on the notion of 'dumbing up'. 11-13
- Peter J. Denning:
Flatlined. 15-19
- Meg McGinity:
Broadband to go. 21-24
- Harold W. Lawson:
Rebirth of the computer industry. 25-29
- Gul Agha:
Introduction. 30-32 - Fabio Kon
, Fábio M. Costa, Gordon S. Blair
, Roy H. Campbell:
The case for reflective middleware. 33-38 - Anand Tripathi:
Challenges designing next-generation middleware systems. 39-42 - Douglas C. Schmidt:
Middleware for real-time and embedded systems. 43-48 - Nalini Venkatasubramanian:
Safe 'composability' of middleware services. 49-52 - Valérie Issarny, Christos Kloukinas
, Apostolos V. Zarras:
Systematic aid for developing middleware architectures. 53-58 - Jean Bacon, Ken Moody:
Toward open, secure, widely distributed services. 59-64
- Diane Crawford:
ACM fellows. 65
- Michael Ettredge, Vernon J. Richardson, Susan Scholz:
Timely financial reporting at corporate web sites? 67-71 - Kai Lung Hui
, Patrick Y. K. Chau:
Classifying digital products. 73-79 - Gary Klein, James J. Jiang, Debbie B. Tesch:
Wanted: project teams with a blend of is professional orientations. 81-87 - Gloria Mark:
Extreme collaboration. 89-93 - Raquel Benbunan-Fich:
Improving education and training with IT. 94-99 - James A. Aries, Subhankar Banerjee, Marc S. Brittan, Eric Dillon, Janusz S. Kowalik, John P. Lixvar:
Capacity and performance analysis of distributed enterprise systems. 100-105
- Patrick P. Gelsinger:
Power play. 106
- Ross J. Anderson:
Free speech online and offline. 120
Volume 45, Number 7, July 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-12
- Brock N. Meeks:
True blue and vigilante, too. 13-15
- Neil Munro:
The ever-expanding network of local and federal databases. 17-19
- Shai Simonson:
A post-baccalaureate undergraduate-level program in computer science. 21-24
- Maris G. Martinsons, Valdis Martinsons:
Rethinking the value of IT, again. 25-26
- Andrew Rosenbloom:
How the virtual inspires the real. 28-31 - W. Daniel Hillis:
The power to shape the world. 32-35 - Alvy Ray Smith:
The reality of simulated actors. 36-39 - Theresa-Marie Rhyne:
Computer games and scientific visualization. 40-44 - Clemens Wagner, Markus A. Schill, Reinhard Männer:
Intraocular surgery on a virtual eye. 45-49 - Marc Pollefeys
, Luc Van Gool:
From images to 3D models. 50-55 - Norman I. Badler, Charles A. Erignac, Ying Liu:
Virtual humans for validating maintenance procedures. 56-63 - Mark Billinghurst
, Hirokazu Kato
:
Collaborative augmented reality. 64-70
- Gordon Bell, Jim Gemmell:
A call for the home media network. 71-75 - Toru Ishida
:
Digital city Kyoto. 76-81 - Katherine M. Shelfer, J. Drew Procaccino:
Smart card evolution. 83-88 - John Gallaugher:
E-commerce and the undulating distribution channel. 89-95 - Snehamay Banerjee, Ram L. Kumar:
Managing electronic interchange of business documents. 96-102 - Jonathon N. Cummings, Brian S. Butler
, Robert E. Kraut:
The quality of online social relationships. 103-108
- Robert M. Davison
:
Cultural complications of ERP. 109-111
- Donald A. Norman:
Beyond the computer industry. 120
Volume 45, Number 8, August 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News tracks. 9-10
- Diane Crawford:
Embrace the engineering metaphor. 11-14
- Cathleen A. Norris, Elliot Soloway, Terry Sullivan:
Examining 25 years of technology in U.S. education. 15-18
- Robert L. Glass:
The proof of correctness wars. 19-21
- Christof Teuscher, Moshe Sipper
:
Hypercomputation: hype or computation?. 23-24
- Ross A. Malaga:
Additional methods when using email for teaching. 25-27
- Usama M. Fayyad, Ramasamy Uthurusamy:
Evolving data into mining solutions for insights. 28-31 - Padhraic Smyth
, Daryl Pregibon, Christos Faloutsos
:
Data-driven evolution of data mining algorithms. 33-37 - Paul S. Bradley, Johannes Gehrke, Raghu Ramakrishnan, Ramakrishnan Srikant:
Scaling mining algorithms to large databases. 38-43 - Ron Kohavi, Neal Rothleder, Evangelos Simoudis:
Emerging trends in business analytics. 45-48 - Chidanand Apté, Bing Liu, Edwin P. D. Pednault, Padhraic Smyth
:
Business applications of data mining. 49-53 - Jiawei Han, Russ B. Altman, Vipin Kumar, Heikki Mannila, Daryl Pregibon:
Emerging scientific applications in data mining. 54-58 - Robert L. Grossman, Mark F. Hornick, Gregor Meyer:
Data mining standards initiatives. 59-61
- Peter Tarasewich, Patrick R. McMullen:
Swarm intelligence: power in numbers. 62-67 - Tim Coltman, Timothy M. Devinney
, Alopi S. Latukefu, David F. Midgley:
Keeping e-business in perspective. 69-73 - Clayton A. Looney, Debabroto Chatterjee:
Web-enabled transformation of the brokerage industry. 75-81 - Craig Van Slyke
, Christie L. Comunale, France Bélanger:
Gender differences in perceptions of web-based shopping. 82-86 - George Chin Jr., James D. Myers
, David Hoyt:
Social networks in the virtual science laboratory. 87-92 - M. A. Quaddus, Lai Lai Tung:
Explaining cultural differences in decision conferencing. 93-98 - Lawrence G. Jones, Arthur L. Price:
Changes in computer science accreditation. 99-103
- Nick Ourosoff:
Primitive types in Java considered harmful. 105-106
- Tolga Acar, John R. Michener:
Risks in features vs. assurance. 112
Volume 45, Number 9, September 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10
- Diane Crawford:
Influencing factors in the computer industry. 11-14
- Hal Berghel:
Responsible web caching. 15-20
- Peter J. Denning:
Career redux. 21-26
- Paul F. Ross:
Whatever became of integrity? 27-28
- Maria M. Klawe:
Making a difference through computing communities. 29-30
- Ralph R. Miller:
Information management in the aftermath of 9/11. 31-33
- Simon Davies:
A year after 9/11: where are we now? 35-39
- Eric A. Brewer
:
Introduction. 40-41 - Marti A. Hearst, Ame Elliott, Jennifer English, Rashmi R. Sinha, Kirsten Swearingen, Ka-Ping Yee:
Finding the flow in web site search. 42-49 - James E. Pitkow, Hinrich Schütze, Todd A. Cass, Robert Cooley, Don Turnbull, Andy Edmonds, Eytan Adar, Thomas M. Breuel:
Personalized search. 50-55 - Abbe Mowshowitz, Akira Kawaguchi:
Bias on the web. 56-60
- James H. Gerlach, Bruce Neumann
, Edwin Moldauer, Martha Argo, Daniel Frisby:
Determining the cost of IT services. 61-67 - Ellen Isaacs, Alan Walendowski, Dipti Ranganathan:
Mobile instant messaging through Hubbub. 68-72 - Ritu Agarwal, Thomas W. Ferratt:
Enduring practices for managing IT professionals. 73-79 - Mike Morrison, Joline Morrison, Anthony Keys:
Integrating web sites and databases. 81-86 - Craig K. Tyran, Joey F. George
:
Improving software inspections with group process support. 87-92 - William R. King, Peter V. Marks, Scott McCoy:
The most important issues in knowledge management. 93-97 - Nikolay V. Shilov
, Kwangkeun Yi:
Engaging students with theory through ACM collegiate programming contest. 98-101
- Mohamed E. Fayad, Shasha Wu:
Merging multiple conventional models in one stable model. 102-106
- Mark Stamp
:
Risks of digital rights management. 120
Volume 45, Number 10, October 2002
- Diane Crawford:
Editorial printers. 5-8 - Robert Fox:
News track. 9-10
- Rebecca Mercuri:
Computer security: quality rather than quantity. 11-14
- Pamela Samuelson:
Reverse engineering under siege. 15-20
- Robert S. Boyer, W. H. J. Feijen, David Gries, C. A. R. Hoare, Jayadev Misra, J. Moore, H. Richards:
In memoriam: Edsger W. Dijkstra 1930-2002. 21-22
- Rafael Palacios
:
Remote automatic doorman via the internet. 23-25
- Alan Howard:
Rapid Application Development: rough and dirty or value-for-money engineering?. 27-29
- Ali Arsanjani:
Introduction. 30-34 - Ivica Crnkovic, Brahim Hnich, Torsten Jonsson, Zeynep Kiziltan:
Specification, implementation, and deployment of components. 35-40 - Erik Meijer, Clemens A. Szyperski
:
Overcoming independent extensibility challenges. 41-44 - Keith Levi, Ali Arsanjani:
A goal-driven approach to enterprise component identification and specification. 45-52 - Ricardo Jardim-Gonçalves
, Adolfo Steiger-Garção:
Implicit multilevel modeling in flexible busines environments. 53-57 - Jeff Sutherland, Willem-Jan van den Heuvel:
Enterprise application integration and complex adaptive systems. 59-64 - Aniruddha S. Gokhale, Douglas C. Schmidt, Balachandran Natarajan, Nanbor Wang:
Applying model-integrated computing to component middleware and enterprise applications. 65-70 - Michael Stal:
Web services: beyond component-based computing. 71-76 - Paul Fremantle, Sanjiva Weerawarana, Rania Khalaf:
Enterprise services. 77-82 - Soo Dong Kim:
Lessons learned from a nationwide CBD promotion project. 83-87
- Winslow Burleson, Ted Selker:
Introduction. 88-90 - Ernest A. Edmonds, Linda Candy:
Creativity, art practice, and knowledge. 91-95 - Lena Mamykina, Linda Candy, Ernest A. Edmonds:
Collaborative creativity. 96-99 - Sharon L. Greene:
Characteristics of applications that support creativity. 100-104 - Michael A. Terry, Elizabeth D. Mynatt:
Supporting experimentation with Side-Views. 106-108 - Chris Roast, Innes Ritchie, Stephanie Thomas:
Re-creating the reader: supporting active reading in literary research. 109-111 - John C. Thomas, Alison Lee, Catalina Danis:
Enhancing creative design via software tools. 112-115 - Ben Shneiderman:
Creativity support tools. 116-120
- E. Vance Wilson
:
Email winners and losers. 121-126 - Ali F. Farhoomand, Donald H. Drury:
Managerial information overload. 127-131 - H. James Nelson, Deborah J. Armstrong, Mehdi Ghods:
Old dogs and new tricks. 132-137 - Patrick Y. K. Chau, Melissa Cole, Anne P. Massey, Mitzi M. Montoya-Weiss, Robert M. O'Keefe:
Cultural differences in the online behavior of consumers. 138-143
- Rajeswari Malladi, Dharma P. Agrawal:
Current and future applications of mobile and wireless networks. 144-146
- Fred B. Schneider:
Secure systems conundrum. 160
Volume 45, Number 11, November 2002
- Diane Crawford:
Editorial printers. 5-8 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-14
- Phillip G. Armour:
Ten unmyths of project estimation. 15-18
- Robert L. Glass:
Sorting out software complexity. 19-21
- Boaz Gelbord, Gert Roelofsen:
New surveillance techniques raise privacy concerns. 23-24
- Zakaria Maamar, Weiming Shen
:
Introduction. 25-26 - Mark Klein, Hiroki Sayama, Peyman Faratin, Yaneer Bar-Yam:
A complex systems perspective on computer-supported collaborative design technology. 27-31 - Soroush Sedaghat, Josef Pieprzyk
, Ehsan Vossough:
On-the-fly web content integrity check boosts users's confidence. 33-37 - Federico Bergenti, Agostino Poggi, Matteo Somacher:
A collaborative platform for fixed and mobile networks. 39-44 - Lihui Wang, Brian Wong, Weiming Shen
, Sherman Y. T. Lang:
A Java 3d-enabled cyber workspace. 45-49
- Jim Gray, Alexander S. Szalay:
The world-wide telescope. 50-55 - David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, Dan Werthimer:
SETI@home: an experiment in public-resource computing. 56-61 - Jon D. Genetti:
Volume-rendered galactic animations. 62-66
- Joaquin Miller:
Introduction. 67-69 - Bran Selic, Guus J. Ramackers, Cris Kobryn:
Evolution, not revolution. 70-72 - Keith Duddy:
UML2 must enable a family of languages. 73-75 - Stephen J. Mellor:
Make models be assets. 76-78 - William Frank, Kevin P. Tyson:
Be clear, clean, concise. 79-81 - Dov Dori
:
Why significant UML change is unlikely. 82-85
- John C. Knight, Nancy G. Leveson:
Should software engineers be licensed?. 87-90 - John White, Barbara Simons:
ACM's position on the licensing of software engineers. 91 - Donald J. Bagert:
Texas licensing of software engineers: all's quiet, for now. 92-94 - Ken Kennedy, Moshe Y. Vardi:
A Rice University perspective on software engineering licensing. 94-95 - David Lorge Parnas:
Licensing software engineers in Canada. 96-98 - Gordon I. McCalla:
Software engineering requires individual professionalism. 98-101
- Dennis de Champeaux:
Software engineering considered harmful. 102-104
- Rebecca Mercuri:
Florida 2002: sluggish systems, vanishing votes. 136
Volume 45, Number 12, December 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-15
- Victor Wacham A. Mbarika, Mike Jensen, Peter Meso:
Cyberspace across sub-Saharan Africa. 17-21
- Jens Palsberg, Scott J. Baxter:
Teaching reviewing to graduate students. 22-24
- Felipe Castel:
Theory, theory on the wall. 25-26
- Upkar Varshney:
Multicast over wireless networks. 31-37 - Aviel D. Rubin:
Security considerations for remote electronic voting. 39-44 - Troy J. Strader, Sridhar N. Ramaswami:
The value of seller trustworthiness in C2C online markets. 45-49 - Christoph Schlueter, Michael J. Shaw:
Emergent patterns of integration in electronic channel systems. 50-55 - Wullianallur Raghupathi, Joseph K. Tan:
Strategic IT applications in health care. 56-61
- Kalle Lyytinen, Youngjin Yoo:
Introduction. 62-65 - Gordon B. Davis:
Anytime/anyplace computing and the future of knowledge work. 67-73 - Jonathan Grudin:
Group dynamics and ubiquitous computing. 74-78 - Daniel P. Siewiorek:
New frontiers of application design. 79-82 - Andrew E. Fano, Anatole Gershman:
The future of business services in the age of ubiquitous computing. 83-87 - Leonard M. Jessup, Daniel Robey:
The relevance of social issues in ubiquitous computing environments. 88-91
- Fernando Berzal Galiano, Ignacio J. Blanco, Juan C. Cubero, Nicolás Marín
:
Comonent-based data mining frameworks. 97-100
- Avishai Wool
:
Why security standards sometimes fail. 144
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.